340 resultados para Programação binível


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In many movies of scientific fiction, machines were capable of speaking with humans. However mankind is still far away of getting those types of machines, like the famous character C3PO of Star Wars. During the last six decades the automatic speech recognition systems have been the target of many studies. Throughout these years many technics were developed to be used in applications of both software and hardware. There are many types of automatic speech recognition system, among which the one used in this work were the isolated word and independent of the speaker system, using Hidden Markov Models as the recognition system. The goals of this work is to project and synthesize the first two steps of the speech recognition system, the steps are: the speech signal acquisition and the pre-processing of the signal. Both steps were developed in a reprogrammable component named FPGA, using the VHDL hardware description language, owing to the high performance of this component and the flexibility of the language. In this work it is presented all the theory of digital signal processing, as Fast Fourier Transforms and digital filters and also all the theory of speech recognition using Hidden Markov Models and LPC processor. It is also presented all the results obtained for each one of the blocks synthesized e verified in hardware

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Software Engineering originated with the motivation to mass produce components for increased productivity in production systems. Since its origins, numerous studies have been proposed on the subject as new features in the creation of systems, like the Object- Oriented Programming and Aspect-Oriented Programming, have been established and methodologies have been developed to control them efficiently. However, years of studies in the area were not sufficient to create a methodology for reusing software artifacts really efficient and easy enough to be widespread. Given this, the Model-Driven Development (MDD) is trying to promote it using the modeling of systems as a reference, becoming part of it and establishing a huge productivity gain. One of his approaches is called Model-Driven Software Development (MDSD), which focuses on improving the practices and systems development using Domain-Specific Languages (DSL) for this purpose. In this Final Paper, Xtext is used as a tool to prove the productivity and efficiency of this approach, and for that bibliographic studies were made on the approach and the tool, and show the methodology and a case study to demonstrate results and conclusions regarding this work

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the universities, before the start of each school year, is held the distribution of classes among available teachers. Therefore, it is necessary to consider the maximum workweek for each teacher and their preferences for each discipline, to prevent a teacher to give lessons in two separate locations at the same time and to avoid some teachers to become overloaded while others with large clearance. This process, manually performed, is time consuming and does not allow the visualization of other combinations of assignment of teachers to classes, besides being liable to error. This work aims to develop a decision support tool for the problem of assigning teachers to classes in college. The project encompasses the development of a computer program using the concepts of object orientation and a tree search algorithm of a combinatorial nature called Beam Search. The programming language used is Java and the program has a graphical interface for entering and manipulating data of the problem. Once obtained the schedule data of classes and teachers is possible, by means of the tool, perform various simulations and manual adjustments to achieve the final result. It is an efficient method of class scheduling, considering the speed of task execution and the fact that it generates only feasible results

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In contemporary times, to which the media is centralized in the hands of a few, it is necessary to understand and discuss its democratization. In this situation it surges a theory that is still maturing, Communication Public, which reflects the communication by the optic of citizen participation. In this sense, the research has as objective the reflection about democracy, the centrality and conglomeration media in society and what is affecting public broadcast organizations. So has too the intention to defend the performance of professional public relations in this context, due to its humanistic and strategic characteristic. Through literature review, observation of programming of Radio FM UNESP Bauru and interviews with employees, it is perceived that the vehicle radio for its intrinsic characteristics has great potential democratization, when this character in public can promote citizenship. There was also observed the demand for professional public relations, assisting the organization to recognize themselves as a social institution, defining its mission, its goals, its vision and policies, with objective to make two-way symmetrical communication to the public

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This work presents a study about the use of standards and directions on parallel programming in distributed systems, using the MPI standard and PETSc toolkit, performing an analysis of their performances over certain mathematic operations involving matrices. The concepts are used to develop applications to solve problems involving Principal Components Analysis (PCA), which are executed in a Beowulf cluster. The results are compared to the ones of an analogous application with sequencial execution, and then it is analized if there was any performance boost on the parallel application

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This project is comprised by an interactive mobile robotics’ environment, focused in human-robot interaction. The system was developed to work in a smartphone, with Android operating system, embedded in a small size mobile robot. Information provided by the smartphone’s camera and microp hone, as well as by proximity sensors embedded in the robot, is used as inputs of a control architecture, implemented in software. It is a behavior-based and receptive to human commands control architecture, to assist the robot’s navigation. The robot is controlled by its own behaviors or by commands em it ted by humans

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The project consists of a book-report on the street movie theaters in Brazil, which are increasingly scarce. Multiplexes are taking the market by several factors, including scheduling and directed to the blockbusters that malls provide security, which does not occur in street theaters, which have a more independent programming. The report will portray the film as a physical space and playful all the influence that the place provides, yet is losing its audience

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This work aims to give greater visibility to the issue of software security, due to people talk a lot in security conferences, that much of both IT (Information Technology) staff and, more specifically, IS (Information Security) staff does not know this, and, thanks to the spread of the mobile computing and of the cloud computing, this lack of deeper knowledge on this subject is increasingly becoming worrisome. It aims too, make applications to be developed in a security manner, priorizing the security of the information processed. It attempts to demonstrate the secure coding techniques, the principles of software security, the means to identify software vulnerabilities, the cutting-edge software exploitation techniques and the mechanisms of mitigation. Nowadays, the security guys are in charge of the most of the security tests in applications, audits and pentests, and it is undeniable that the so-called security experts, most often come from computer network field, having few experience in software development and programming. Therefore, the development process does not consider the security issue, thanks to the lack of knowledge on the subject by the developer, and the security tests could be improved whether security experts had a greater know-how on application development. Given this problem, the goal here is to integrate information security with software development, spreading out the process of secure software development. To achieve this, a Linux distribution with proof of concept applicati... (Complete abstract click electronic access below)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This work, entitled Websislapam: People Rating System Based on Web Technologies, allows the creation of questionnaires, and the organization of entities and people who participate in evaluations. Entities collect data from people with the help of resources that reduce typing mistakes. The Websislapam maintains a database and provides graphical reporting, which enable the analysis of those tested. Developed using Web technologies such as PHP, Javascript, CSS, and others. Developed with the paradigm of object-oriented programming and the MySQL DBMS. For the theoretical basis, research in the areas of System Database, Web Technologies and Web Engineering were performed. It was determined the evaluation process, systems and Web-based applications, Web and System Engineering Database. Technologies applied in the implementation of Websislapam been described. In a separate chapter presented the main features and artifacts used in the development of Websislapam. A case study demonstrates the practical use of the system

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Increasingly competitive markets have driven the search for companies in many different ways to win and keep customers. The service level is basically the performance of companies in fulfilling the orders made, or how companies demonstrate to their clients efforts in their behalf. This work aims to solve the difficulties faced by a multinational company present in Brazil, in the distribution of its products in the category Ice Cream in order to improve the service level of their customers. Review the logistics network and concepts related to the distribution system of products is one of several ways to achieve this goal, as well as the use of IT and tools to assist in planning and programming of the physical distribution of products. In this study we used the concept of direct distribution system called Transit Point (TP). The TP provides at the same time, a strategy of rapid response, flexibility, low transportation costs and no inventory. A router - software capable of simulating the actual conditions experienced in the daily distribution - was used to assist in calculations. Results showed reductions of up to 47.5% in transportation costs and better conditions were provided in the distribution of products, positively impacting on service levels and in the maintenance of products quality, with a reduction of 1.6% of the total costs involve

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Não disponível

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Given the exponential growth in the spread of the virus world wide web (Internet) and its increasing complexity, it is necessary to adopt more complex systems for the extraction of malware finger-prints (malware fingerprints - malicious software; is the name given to extracting unique information leading to identification of the virus, equivalent to humans, the fingerprint). The architecture and protocol proposed here aim to achieve more efficient fingerprints, using techniques that make a single fingerprint enough to compromise an entire group of viruses. This efficiency is given by the use of a hybrid approach of extracting fingerprints, taking into account the analysis of the code and the behavior of the sample, so called viruses. The main targets of this proposed system are Polymorphics and Metamorphics Malwares, given the difficulty in creating fingerprints that identify an entire family from these viruses. This difficulty is created by the use of techniques that have as their main objective compromise analysis by experts. The parameters chosen for the behavioral analysis are: File System; Records Windows; RAM Dump and API calls. As for the analysis of the code, the objective is to create, in binary virus, divisions in blocks, where it is possible to extract hashes. This technique considers the instruction there and its neighborhood, characterized as being accurate. In short, with this information is intended to predict and draw a profile of action of the virus and then create a fingerprint based on the degree of kinship between them (threshold), whose goal is to increase the ability to detect viruses that do not make part of the same family

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The work consists of analyzing the risk management of investments by applying statistical concepts, economic and mathematical models considering the assets on the market on renowned financial institution. The assessment of these risks becomes increasingly interesting in view of minimizing your losses thus maximizing your chances of gains in both markets boom as extreme uncertainty, even with the sudden changes of scenery. Introducing concepts of investment funds, as well as the classification of the types of funds as funds management and equity, its guidelines, the concept of market investment funds. The types of assets comprising the investment funds, their taxation rules beyond the incidents that market widely used by investors and skilled people, both physical and legal, who keep their resources in this modality. With the historical data collected yields of investment funds of the Bank of Brazil, is an accomplished inflation adjustment and calculated the mean and variance for the verification of the model of Markowitz efficient frontier, a method used as investment analysis. This scan is used Matlab to obtain the set (or border) efficient portfolios. Once verified such data, there will be a critique of the Markowitz model as a quadratic programming and more coherent risk measures currently studied as VaR and CVaR minimizing the expected error, approaching our studies of current research. It is found that such studies have much to be explored, since there are many discussions about how effectively measure risk investments such as its characteristic and behavior, using a time series and volatility

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The following paper means to develop a program to make structural analysis of space trusses. The program to be implemented was based on the concepts of the finite element method and used the programing resources of Visual Basic for Applications (VBA) for the Excel Software®. Being Excel® a software of easy access, low cost, capacity to make matrix calculations and with advanced resources of VBA programing, it is possible to develop an economic solution, efficient and precise for structural analysis of space trusses. Firstly is presented a finite elemento method and the space truss. Then is developed a few important algorithms to be used during the development of the program and also the use of a few resources of VBA. And to validate the quality, efficiency and precision of the results, these are compared with the established commercial software Ansys

Relevância:

10.00% 10.00%

Publicador:

Resumo:

O presente trabalho procura entender como a globalização, através da diversidade cultural, pode interferir na vida profissional das pessoas. Tendo como objeto de estudo as disparidades culturais encontradas na IBM Brasil, o trabalho apresenta conceitos da globalização e indaga suas principais consequências na multinacional em questão. Busca identificar as mudanças necessárias no processo de adequação às diferenças culturais entre países e pessoas, entender como as diferenças interculturais podem afetar a vida dos funcionários e como eles aprenderam a lidar com essas diferenças. De modo geral, procura identificar se a globalização fez com que os profissionais se adequassem às diferenças intercontinentais ou se a própria globalização selecionou os profissionais mais adequados ao mercado global